www.cmanextstep.com Open in urlscan Pro
2606:4700:3037::6818:77b9  Malicious Activity! Public Scan

URL: https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
Submission Tags: @ipnigh
Submission: On April 18 via api from GB

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 6 HTTP transactions. The main IP is 2606:4700:3037::6818:77b9, located in United States and belongs to CLOUDFLARENET, US. The main domain is www.cmanextstep.com.
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on January 30th 2020. Valid for: 8 months.
This is the only time www.cmanextstep.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
4 2606:4700:303... 13335 (CLOUDFLAR...)
1 151.101.112.193 54113 (FASTLY)
1 104.16.1.35 13335 (CLOUDFLAR...)
6 3
Apex Domain
Subdomains
Transfer
4 cmanextstep.com
www.cmanextstep.com
4 KB
2 imgur.com
i.imgur.com
i.stack.imgur.com
276 KB
6 2
Domain Requested by
4 www.cmanextstep.com www.cmanextstep.com
1 i.stack.imgur.com www.cmanextstep.com
1 i.imgur.com www.cmanextstep.com
6 3

This site contains no links.

Subject Issuer Validity Valid
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2020-01-30 -
2020-10-09
8 months crt.sh
*.imgur.com
DigiCert SHA2 Secure Server CA
2020-01-15 -
2022-03-16
2 years crt.sh
i.stack.imgur.com
DigiCert SHA2 Secure Server CA
2018-10-16 -
2020-11-25
2 years crt.sh

This page contains 1 frames:

Primary Page: https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
Frame ID: E2CDEDEF8699D4B64F7376D92052F0E7
Requests: 6 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^cloudflare$/i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

6
Requests

100 %
HTTPS

33 %
IPv6

2
Domains

3
Subdomains

3
IPs

2
Countries

280 kB
Transfer

285 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.cmanextstep.com/strap/ht/
8 KB
3 KB
Document
General
Full URL
https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6818:77b9 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6609a0977fa87238054d61ca5b1b60612fe1cdb7fa107ebc0bdbffd0fe483416

Request headers

:method
GET
:authority
www.cmanextstep.com
:scheme
https
:path
/strap/ht/?email=michael.murray@dynata.com
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
date
Sat, 18 Apr 2020 02:35:05 GMT
content-type
text/html; charset=utf-8
set-cookie
__cfduid=d1bf2145b01509172818ef4afb268a3041587177305; expires=Mon, 18-May-20 02:35:05 GMT; path=/; domain=.cmanextstep.com; HttpOnly; SameSite=Lax; Secure
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
585afd8e1966176a-FRA
content-encoding
br
cf-request-id
022cbcccd20000176a160ea200000001
jquery.js
www.cmanextstep.com/strap/ht/js/
0
0
Script
General
Full URL
https://www.cmanextstep.com/strap/ht/js/jquery.js
Requested by
Host: www.cmanextstep.com
URL: https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6818:77b9 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

Referer
https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 18 Apr 2020 02:35:08 GMT
cf-cache-status
BYPASS
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
status
404
cache-control
no-transform, no-cache, no-store, must-revalidate
cf-ray
585afd919d28176a-FRA
link
<https://www.cmanextstep.com/wp-json/>; rel="https://api.w.org/"
cf-request-id
022cbcceff0000176a160fb200000001
expires
Wed, 11 Jan 1984 05:00:00 GMT
vofCsbF.jpg
i.imgur.com/
2 KB
2 KB
Image
General
Full URL
https://i.imgur.com/vofCsbF.jpg
Requested by
Host: www.cmanextstep.com
URL: https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.112.193 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
cat factory 1.0 /
Resource Hash
11ea121407753d8dde37c8bef8f75ae33f377ca071e047faab7ffe53f66e2281

Request headers

Referer
https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 18 Apr 2020 02:35:05 GMT
age
856838
x-cache
HIT, HIT
status
200
content-length
1860
x-served-by
cache-bwi5129-BWI, cache-hhn4024-HHN
last-modified
Wed, 08 Apr 2020 04:33:31 GMT
server
cat factory 1.0
x-timer
S1587177306.983986,VS0,VE1
etag
"7149ee0eeddd419b1ccda377ca4ed763"
access-control-allow-methods
GET, OPTIONS
content-type
image/jpeg
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
x-cache-hits
2, 1
ms-logo-v1%20copy.svg
www.cmanextstep.com/wp-content/uploads/
756 B
556 B
Image
General
Full URL
https://www.cmanextstep.com/wp-content/uploads/ms-logo-v1%20copy.svg
Requested by
Host: www.cmanextstep.com
URL: https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6818:77b9 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5d3357bd875b7335ace42e8ee3a64578e4253bed1a4e279109de403eedae3a69

Request headers

Referer
https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 18 Apr 2020 02:35:06 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 08 Apr 2020 04:55:23 GMT
server
cloudflare
age
61695
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding,User-Agent
content-type
image/svg+xml
status
200
cache-control
public, max-age=16070400
cf-ray
585afd929e28176a-FRA
cf-request-id
022cbccfa30000176a16101200000001
expires
Sun, 17 May 2020 09:26:51 GMT
email-decode.min.js
www.cmanextstep.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/
1 KB
892 B
Script
General
Full URL
https://www.cmanextstep.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js
Requested by
Host: www.cmanextstep.com
URL: https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6818:77b9 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2595496fe48df6fcf9b1bc57c29a744c121eb4dd11566466bc13d2e52e6bbcc8
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 18 Apr 2020 02:35:06 GMT
content-encoding
gzip
vary
Accept-Encoding
last-modified
Tue, 14 Apr 2020 14:46:15 GMT
server
cloudflare
etag
W/"5e95ccb7-4d7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
x-frame-options
SAMEORIGIN
content-type
application/javascript
status
200
cache-control
max-age=172800, public
cf-ray
585afd929e17176a-FRA
cf-request-id
022cbccf9a0000176a16100200000001
expires
Mon, 20 Apr 2020 02:35:06 GMT
vzbuQ.jpg
i.stack.imgur.com/
273 KB
274 KB
Image
General
Full URL
https://i.stack.imgur.com/vzbuQ.jpg
Requested by
Host: www.cmanextstep.com
URL: https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
104.16.1.35 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
6bde963a562ffd594492bdff280c01e9e6518856aa3a9f14b96fcad867ce2f0f

Request headers

Referer
https://www.cmanextstep.com/strap/ht/?email=michael.murray@dynata.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Sat, 18 Apr 2020 02:35:08 GMT
cf-cache-status
HIT
age
6086290
status
200
content-type
image/jpeg
content-length
279841
cf-request-id
022cbcd8240000edbb48b82200000001
last-modified
Sun, 17 Jun 2018 23:41:30 GMT
server
cloudflare
etag
"bcc8c3add31d42b2c4b6d13c0db8d3a5"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
x-amz-version-id
V.CiiONugOFcBvoHG0Y85bcKnjQRsbB5
cache-control
public, max-age=315360000
accept-ranges
bytes
cf-ray
585afda03e64edbb-CDG
expires
Tue, 16 Apr 2030 02:35:08 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

1 Cookies

Domain/Path Name / Value
.cmanextstep.com/ Name: __cfduid
Value: d1bf2145b01509172818ef4afb268a3041587177305